122:
organization has a different facility code and their card set also increments from 1. Thus different organizations can have card sets with the same card numbers but since the facility codes differ, the cards only work at one organization. This idea worked fine for a while but there is no governing body controlling card numbers, different manufacturers can supply cards with identical facility codes and identical card numbers to different organizations. Thus there is a problem of duplicate cards. To counteract this problem some manufacturers have created formats beyond 26 bit
Wiegand that they control and issue to an organization.
29:
105:
was used in early access cards. This method was abandoned in favor of other proximity technologies. The new technologies retained the
Wiegand upstream data so that the new readers were compatible with old systems. Readers are still called Wiegand but no longer use the Wiegand effect. A Wiegand reader
121:
A common proximity format is 26 bit
Wiegand. This format uses a facility code, also called a site code. The facility code is a unique number common to all of the cards in a particular set. The idea is an organization has their own facility code and then numbered cards incrementing from 1. Another
97:
that makes access control decisions based on information about the credential. If the credential is included in an access control list, the access control system unlocks the controlled access point. The transaction is stored in the system for later retrieval; reports can be generated showing the
125:
In the 26 bit
Wiegand format bit 1 is an even parity bit. Bits 2-9 are a facility code. Bits 10-25 are the card number. Bit 26 is an odd parity bit. Other formats have a similar structure of leading facility code followed by card number and including parity bits for error checking.
118:. The integrated circuit outputs the card number to the coil which transmits it to the reader. The transmission of the card number happens in the clear—it is not encrypted. With basic understanding of radio technology and of card formats, Wiegand proximity cards can be hacked.
132:
can be used to counteract the problems of transmitting card numbers in the clear and control of the card numbers by manufacturers. Smart cards can be encoded by organizations with unique numbers and the communication between card and reader can be
93:. This number is usually called the facility code and is programmed by the administrator. The number is sent to an access control system, a
62:
Access badges use various technologies to identify the holder of the badge to an access control system. The most common technologies are
21:
302:
17:
241:
110:. When a card is presented to the reader, the reader's electrical field excites a coil in the card. The coil charges a
201:
323:
256:
236:
226:
63:
161:
115:
261:
231:
166:
221:
79:
306:
266:
196:
181:
94:
299:
281:
246:
146:
102:
67:
45:
28:
317:
186:
176:
83:
216:
211:
156:
129:
90:
48:
276:
271:
206:
171:
151:
107:
75:
41:
134:
111:
56:
251:
191:
106:
radiates a 1" to 5" electrical field around itself. Cards use a simple
71:
16:
300:
Southern Utah
University in View, Fall 2004, Alumni Awards, pages 3-4
98:
date/time the card was used to enter the controlled access point.
27:
15:
52:
32:
A private security officer with an access card/ID card
89:
The access badge contains a number that is read by a
82:. The magnetic stripe ID card was invented by
44:used to gain entry to an area having automated
8:
292:
7:
59:, parking gates or other barriers.
14:
242:Physical Security Professional
1:
340:
114:and in turn powers an
51:. Entry points may be
33:
25:
202:IP video surveillance
31:
19:
257:Security engineering
237:Photo identification
227:Magnetic stripe card
305:2011-10-27 at the
162:Common Access Card
116:integrated circuit
34:
26:
24:Common Access Card
262:Security lighting
232:Optical turnstile
167:Computer security
80:biometric devices
331:
309:
297:
222:Logical security
339:
338:
334:
333:
332:
330:
329:
328:
314:
313:
312:
307:Wayback Machine
298:
294:
290:
267:Security policy
197:ID card printer
182:Electronic lock
143:
95:computer system
64:magnetic stripe
12:
11:
5:
337:
335:
327:
326:
316:
315:
311:
310:
291:
289:
286:
285:
284:
282:Wiegand effect
279:
274:
269:
264:
259:
254:
249:
247:Proximity card
244:
239:
234:
229:
224:
219:
214:
209:
204:
199:
194:
189:
184:
179:
174:
169:
164:
159:
154:
149:
147:Access control
142:
139:
103:Wiegand effect
46:access control
13:
10:
9:
6:
4:
3:
2:
336:
325:
322:
321:
319:
308:
304:
301:
296:
293:
287:
283:
280:
278:
275:
273:
270:
268:
265:
263:
260:
258:
255:
253:
250:
248:
245:
243:
240:
238:
235:
233:
230:
228:
225:
223:
220:
218:
215:
213:
210:
208:
205:
203:
200:
198:
195:
193:
190:
188:
187:Fortification
185:
183:
180:
178:
177:Door security
175:
173:
170:
168:
165:
163:
160:
158:
155:
153:
150:
148:
145:
144:
140:
138:
136:
131:
127:
123:
119:
117:
113:
109:
104:
99:
96:
92:
87:
85:
84:Forrest Parry
81:
77:
73:
69:
65:
60:
58:
54:
50:
47:
43:
39:
30:
23:
18:
295:
217:Lock picking
212:Locksmithing
157:Card printer
128:
124:
120:
100:
88:
78:and various
61:
49:entry points
38:access badge
37:
35:
324:Identifiers
130:Smart cards
91:card reader
76:smart cards
20:An example
288:References
277:Swipe card
272:Smart card
172:Credential
152:Biometrics
108:LC circuit
86:in 1960.
57:turnstiles
42:credential
135:encrypted
112:capacitor
68:proximity
318:Category
303:Archived
252:Security
207:Keycards
141:See also
192:ID Card
72:barcode
53:doors
40:is a
101:The
36:An
22:DoD
320::
137:.
74:,
70:,
66:,
55:,
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.